TP-Link TL-ER5120 TL-ER5120 User Guide - Page 116

Application

Page 116 highlights

Chapter 4 Application 4.1 Network Requirements The company has established the server farms in the headquarters to provide the Web, Mail and FTP services for all the staff. The dedicated line access service was used by this company, which costs greatly in network maintain and cable layout. With the business development of the company, it's required to establish an effective, safe and stable network with low cost for this company. The detailed requirements are as follows: ¾ Internet Access This company has terminated the dedicated line access service but maintained one dedicated line as the backup line, and has applied a high-bandwidth Fiber Access as the main line. ¾ Network Management To avoid some of the staff using IM/P2P application at the working time to occupy a lot of network bandwidth, it's required to implement the online behavior management and to specify the network bandwidth limit for each staff member. ¾ Network Security This enterprise network should be able to defend the common attacks from the internal or the external network, such as ARP Attack and DoS Attack. Moreover, the real-time monitoring on the network traffic is required. 4.2 Configurations You can configure the Router via the PC connected to the LAN port of this Router. To log in to the Router, the IP address of your PC should be in the same subnet of the LAN port of this Router. (The default subnet of LAN port is 192.168.0.0/24.). The IP address of your PC can be obtained automatically or configured manually. To access the configuration utility, open a web-browser and type in the default address http://192.168.0.1 in the address field of the browser, then press the Enter key. In the login window, enter admin for the User Name and Password, both in lower case letters. Then click the button to log into the Router. Tips: If the LAN IP address is changed, you must use the new IP address to log into the Router. 4.2.1 Internet Setting You can connect the Fiber Optic Modem and the dedicated line to the WAN1 port and the WAN2 port separately. Suppose both the two connections are the Static IP connections. The Line Backup function -111-

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146

-111-
Chapter 4 Application
4.1 Network Requirements
The company has established the server farms in the headquarters to provide the Web, Mail and FTP
services for all the staff. The dedicated line access service was used by this company, which costs
greatly in network maintain and cable layout. With the business development of the company, it’s
required to establish an effective, safe and stable network with low cost for this company. The detailed
requirements are as follows:
¾
Internet Access
This company has terminated the dedicated line access service but maintained one dedicated
line as the backup line, and has applied a high-bandwidth Fiber Access as the main line.
¾
Network Management
To avoid some of the staff using IM/P2P application at the working time to occupy a lot of
network bandwidth, it’s required to implement the online behavior management and to specify
the network bandwidth limit for each staff member.
¾
Network Security
This enterprise network should be able to defend the common attacks from the internal or the
external network, such as ARP Attack and DoS Attack. Moreover, the real-time monitoring on
the network traffic is required.
4.2 Configurations
You can configure the Router via the PC connected to the LAN port of this Router. To log in to the
Router, the IP address of your PC should be in the same subnet of the LAN port of this Router. (The
default subnet of LAN port is 192.168.0.0/24.). The IP address of your PC can be obtained
automatically or configured manually.
To access the configuration utility, open a web-browser and type in the default address
http://192.168.0.1 in the address field of the browser, then press the
Enter
key. In the login window,
enter
admin
for the User Name and Password, both in lower case letters. Then click the
<Login>
button to log into the Router.
Tips:
If the LAN IP address is changed, you must use the new IP address to log into the Router.
4.2.1 Internet Setting
You can connect the Fiber Optic Modem and the dedicated line to the WAN1 port and the WAN2 port
separately. Suppose both the two connections are the Static IP connections. The Line Backup function